Binance Square

haker

47,368 views
15 Discussing
Mast Qalandar
--
The Great Memecoin Heist: A Hacker’s Gambit 🤹💵🤗BNB Chain ⛓️ X account Hacked 🧤 In a daring exploit, a hacker compromised the $BNB Chain X account, unleashing a cunning scheme. The attacker launched a fake memecoin called “4” masquerading as CZ, and leveraged the hijacked account to promote it. The hacker swiftly dumped the tokens, netting approximately $4,000 in illicit gains. Community’s Unlikely Response 👍 In a surprising twist, the community refused to panic. Instead, they enthusiastically bought into the memecoin, determined to drive its price up. This unexpected counterattack caught everyone’s attention. CZ’s Unexpected Praise 🙌 CZ praised the community’s reaction as “the funniest counterattack,” injecting further momentum into the memecoin. The token skyrocketed over 3,000%, defying expectations and showcasing the unpredictable nature of cryptocurrency markets. This incident highlights the resilience and humor within the crypto community. $ETH $SOL #BREAKING #BreakingCryptoNews #HotTrends #BinanceSquareFamily #Haker

The Great Memecoin Heist: A Hacker’s Gambit 🤹💵🤗

BNB Chain ⛓️ X account Hacked 🧤
In a daring exploit, a hacker compromised the $BNB Chain X account, unleashing a cunning scheme. The attacker launched a fake memecoin called “4” masquerading as CZ, and leveraged the hijacked account to promote it.
The hacker swiftly dumped the tokens, netting approximately $4,000 in illicit gains.

Community’s Unlikely Response 👍
In a surprising twist, the community refused to panic. Instead, they enthusiastically bought into the memecoin, determined to drive its price up.
This unexpected counterattack caught everyone’s attention.

CZ’s Unexpected Praise 🙌
CZ praised the community’s reaction as “the funniest counterattack,” injecting further momentum into the memecoin.
The token skyrocketed over 3,000%, defying expectations and showcasing the unpredictable nature of cryptocurrency markets.
This incident highlights the resilience and humor within the crypto community.
$ETH $SOL

#BREAKING #BreakingCryptoNews #HotTrends #BinanceSquareFamily #Haker
See original
👾North Korean hackers use neural networks for cryptocurrency theft 📱 Google has discovered a new wave of hacker attacks. Malicious programs have begun using AI models to rewrite their code. This helps them 'hide' from antivirus programs and search for crypto wallets. 🫣 Cybercriminals UNC1069 used Gemini for their 'black' operations. In particular, the chatbot searched for wallet files, keys on gadgets, wrote access scripts for encrypted storage, and created phishing messages for employees of cryptocurrency exchanges. $BTC {spot}(BTCUSDT) $BNB {spot}(BNBUSDT) $SOL {spot}(SOLUSDT) #GENIUSAct #AITokensRally #Haker #Binanceholdermmt
👾North Korean hackers use neural networks for cryptocurrency theft

📱 Google has discovered a new wave of hacker attacks. Malicious programs have begun using AI models to rewrite their code. This helps them 'hide' from antivirus programs and search for crypto wallets.

🫣 Cybercriminals UNC1069 used Gemini for their 'black' operations. In particular, the chatbot searched for wallet files, keys on gadgets, wrote access scripts for encrypted storage, and created phishing messages for employees of cryptocurrency exchanges.
$BTC

$BNB

$SOL

#GENIUSAct #AITokensRally #Haker #Binanceholdermmt
#cryptojackers Cryptojacking: Hackers just want to borrow your CPU Cryptojackers are individuals or groups who engage in the unauthorized use of computing resources to mine cryptocurrency. This process, known as cryptojacking, involves exploiting a victim's device to mine cryptocurrencies without their consent or knowledge. Cryptojackers typically target various devices such as desktops, laptops, smartphones, servers, and even cloud infrastructure. They employ a range of techniques to gain access to these resources, including embedding malicious scripts in websites, using phishing emails to trick users into downloading mining software, and compromising open-source code repositories. One of the most common methods used by cryptojackers is to inject JavaScript-based mining scripts into websites, which run when users visit the site. Another method involves tricking users into downloading mining software through phishing emails. Cryptojackers often target high-value assets like servers and cloud infrastructure due to their powerful computational capabilities. They may also exploit vulnerabilities in software and hardware to gain unauthorized access to computing resources. The primary motivation for cryptojackers is financial gain. By using stolen computing resources, they can mine cryptocurrency without incurring the costs associated with purchasing and maintaining mining hardware and paying for electricity. Cryptojacking can lead to performance issues for victims, including slower device performance, overheating, increased electricity bills, and shortened device lifespan. #Write2Earn #Haker #BinanceSquareFamily
#cryptojackers

Cryptojacking:

Hackers just want to borrow your CPU

Cryptojackers are individuals or groups who engage in the unauthorized use of

computing resources to mine cryptocurrency.

This process, known as cryptojacking, involves exploiting a victim's device to

mine cryptocurrencies without their consent or knowledge.

Cryptojackers typically target various devices such as desktops, laptops,

smartphones, servers, and even cloud infrastructure.

They employ a range of techniques to gain access to these resources,

including embedding malicious scripts in websites, using phishing emails to

trick users into downloading mining software, and compromising open-source code repositories.

One of the most common methods used by cryptojackers is to inject

JavaScript-based mining scripts into websites, which run when users visit

the site.

Another method involves tricking users into downloading mining software

through phishing emails.

Cryptojackers often target high-value assets like servers and cloud

infrastructure due to their powerful computational capabilities.

They may also exploit vulnerabilities in software and hardware to gain

unauthorized access to computing resources.

The primary motivation for cryptojackers is financial gain.

By using stolen computing resources, they can mine cryptocurrency without

incurring the costs associated with purchasing and maintaining mining

hardware and paying for electricity.

Cryptojacking can lead to performance issues for victims, including slower

device performance, overheating, increased electricity bills, and

shortened device lifespan.

#Write2Earn
#Haker
#BinanceSquareFamily
Bybit Security Breach.What Happened?On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum ($ETH ). This incident is considered one of the largest in the history of cryptocurrency thefts. Details of the Breach The attack occurred during a routine transfer from one of Bybit's cold wallets to a warm wallet. The perpetrator manipulated the transaction interface, gaining control over the cold wallet and transferring around 401,000 ETH to an unidentified address. Bybit's CEO, Ben Zhou, confirmed the breach, stating that the attacker exploited a "masked" user interface and URL, deceiving wallet signers into approving a malicious transaction. This manipulation altered the smart contract logic, granting the attacker control over the wallet's contents. Immediate Response and Assurances In the aftermath of the breach, Bybit assured its users that all client assets remain secure and fully backed. The exchange processed over 350,000 withdrawal requests promptly, emphasizing its commitment to maintaining operational integrity. Despite the substantial loss, Zhou emphasized that Bybit remains solvent and capable of absorbing the financial impact without compromising user funds. Ongoing Investigation Bybit is actively collaborating with blockchain forensic experts and authorities to trace and recover the stolen funds. Preliminary analyses suggest that the attack may be linked to North Korean hacker groups, known for previous large-scale cryptocurrency thefts. The stolen ETH is reportedly being moved to new addresses, complicating recovery efforts. Industry Implications This breach underscores the persistent security challenges within the cryptocurrency sector. In 2024 alone, approximately $2.2 billion was stolen from various crypto platforms, highlighting the need for enhanced security measures. The Bybit incident serves as a stark reminder for exchanges and users alike to prioritize robust security protocols to safeguard digital assets. As the investigation continues, the cryptocurrency community remains vigilant, awaiting further updates on the situation and potential measures to prevent such incidents in the future. #BybitSecurityBreach #VIRTUALWhale #Haker #SecurityAlert

Bybit Security Breach.What Happened?

On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum ($ETH ). This incident is considered one of the largest in the history of cryptocurrency thefts.
Details of the Breach
The attack occurred during a routine transfer from one of Bybit's cold wallets to a warm wallet. The perpetrator manipulated the transaction interface, gaining control over the cold wallet and transferring around 401,000 ETH to an unidentified address. Bybit's CEO, Ben Zhou, confirmed the breach, stating that the attacker exploited a "masked" user interface and URL, deceiving wallet signers into approving a malicious transaction. This manipulation altered the smart contract logic, granting the attacker control over the wallet's contents.
Immediate Response and Assurances
In the aftermath of the breach, Bybit assured its users that all client assets remain secure and fully backed. The exchange processed over 350,000 withdrawal requests promptly, emphasizing its commitment to maintaining operational integrity. Despite the substantial loss, Zhou emphasized that Bybit remains solvent and capable of absorbing the financial impact without compromising user funds.
Ongoing Investigation
Bybit is actively collaborating with blockchain forensic experts and authorities to trace and recover the stolen funds. Preliminary analyses suggest that the attack may be linked to North Korean hacker groups, known for previous large-scale cryptocurrency thefts. The stolen ETH is reportedly being moved to new addresses, complicating recovery efforts.
Industry Implications
This breach underscores the persistent security challenges within the cryptocurrency sector. In 2024 alone, approximately $2.2 billion was stolen from various crypto platforms, highlighting the need for enhanced security measures. The Bybit incident serves as a stark reminder for exchanges and users alike to prioritize robust security protocols to safeguard digital assets.
As the investigation continues, the cryptocurrency community remains vigilant, awaiting further updates on the situation and potential measures to prevent such incidents in the future.
#BybitSecurityBreach #VIRTUALWhale #Haker #SecurityAlert
See original
👨‍💻 #Haker #defi #defisaver #DeFi: DeFi hacks became the main reason for losses in May. Cryptocurrency users and DeFi protocols lost 302 million dollars in May due to hacks and fraud. 🔒 The main reason for the losses was code vulnerabilities in DeFi protocols, leading to multiple incidents totaling 229 million dollars. The biggest hack of this month was the incident involving the Cetus Protocol exchange, which lost 223 million dollars.
👨‍💻
#Haker #defi #defisaver #DeFi:
DeFi hacks became the main reason for losses in May.

Cryptocurrency users and DeFi protocols lost 302 million dollars in May due to hacks and fraud.

🔒 The main reason for the losses was code vulnerabilities in DeFi protocols, leading to multiple incidents totaling 229 million dollars.

The biggest hack of this month was the incident involving the Cetus Protocol exchange, which lost 223 million dollars.
See original
Trump's Project Failed: Hackers Found a Loophole in the Fresh Ethereum Update and Are Already Making Off with TokensAnd again a hack and no one is surprised anymore. This time, the crypto project World Liberty Financial ( $WLFI ), linked to Donald Trump and his family, was hit. It turns out that the reason was a recent 'gift' for hackers — the Ethereum EIP-7702 update (part of the Pectra upgrade). According to researchers from SlowMist, this update, which was supposed to make life easier for crypto users, instead created the perfect loophole for token theft.

Trump's Project Failed: Hackers Found a Loophole in the Fresh Ethereum Update and Are Already Making Off with Tokens

And again a hack and no one is surprised anymore. This time, the crypto project World Liberty Financial ( $WLFI ), linked to Donald Trump and his family, was hit.
It turns out that the reason was a recent 'gift' for hackers — the Ethereum EIP-7702 update (part of the Pectra upgrade). According to researchers from SlowMist, this update, which was supposed to make life easier for crypto users, instead created the perfect loophole for token theft.
See original
#Haker 🕵️‍♂️ The story of the hacker who returned $600 million in crypto 🎭 In 2021, one of the largest hacks in the history of cryptocurrencies occurred. An unknown hacker stole $611 million in digital assets from Poly Network, a DeFi platform. However, what happened next surprised everyone… 🔹 The theft: The hacker exploited a vulnerability in Poly Network's smart contracts and took funds in ETH, USDC, and other cryptos. 🔹 The unexpected twist: Instead of disappearing with the money, the hacker began to return the funds gradually. In messages within the transactions, he claimed he did it “for fun” and to teach a lesson about security. 🔹 The surprising ending: After returning all the money, Poly Network offered him a position as a "security advisor," although it is unknown if he accepted. The community nicknamed him "Mr. White Hat," in reference to ethical hackers. 🔥 Do you think it was an act of ethics or did he simply fear being caught? Let me know your opinion in the comments. 👇👇 $BTC $ETH $BNB
#Haker 🕵️‍♂️ The story of the hacker who returned $600 million in crypto 🎭

In 2021, one of the largest hacks in the history of cryptocurrencies occurred. An unknown hacker stole $611 million in digital assets from Poly Network, a DeFi platform. However, what happened next surprised everyone…

🔹 The theft:
The hacker exploited a vulnerability in Poly Network's smart contracts and took funds in ETH, USDC, and other cryptos.

🔹 The unexpected twist:
Instead of disappearing with the money, the hacker began to return the funds gradually. In messages within the transactions, he claimed he did it “for fun” and to teach a lesson about security.

🔹 The surprising ending:
After returning all the money, Poly Network offered him a position as a "security advisor," although it is unknown if he accepted. The community nicknamed him "Mr. White Hat," in reference to ethical hackers.

🔥 Do you think it was an act of ethics or did he simply fear being caught? Let me know your opinion in the comments. 👇👇

$BTC $ETH $BNB
See original
Report: Cryptocurrency Thefts Decline, Measures Complicate Digital FraudSlumist’s Q3 2024 report on cryptocurrency theft reveals a decline in overall theft incidents. However, the report highlights a rise in sophisticated phishing attempts, which often involve advanced social engineering tactics. One worrying trend is that sponsored search results can lead to fraudulent links. However, the most common thefts are simpler, resulting from key leaks.

Report: Cryptocurrency Thefts Decline, Measures Complicate Digital Fraud

Slumist’s Q3 2024 report on cryptocurrency theft reveals a decline in overall theft incidents. However, the report highlights a rise in sophisticated phishing attempts, which often involve advanced social engineering tactics.
One worrying trend is that sponsored search results can lead to fraudulent links. However, the most common thefts are simpler, resulting from key leaks.
See original
Hacker stole $200 million in an attack on Cetus: Changpeng Zhao promised to help the Sui ecosystemThe network faced the largest attack in its ecosystem: the decentralized protocol Cetus was hacked, resulting in the attackers managing to withdraw over $200 million. Earlier reports indicated losses of $11 million. According to PeckShield and MistTrack, part of the stolen funds — about $60 million — has already been transferred to the network through a cross-chain application. The remaining amount is still being distributed through various channels, including DEXs and mixers.

Hacker stole $200 million in an attack on Cetus: Changpeng Zhao promised to help the Sui ecosystem

The network faced the largest attack in its ecosystem: the decentralized protocol Cetus was hacked, resulting in the attackers managing to withdraw over $200 million. Earlier reports indicated losses of $11 million. According to PeckShield and MistTrack, part of the stolen funds — about $60 million — has already been transferred to the network through a cross-chain application. The remaining amount is still being distributed through various channels, including DEXs and mixers.
🔴🟢Breaking:- Iranian crypto exchange Nobitex hacked for $48 million. Funds were sent to the following TRON wallet:-.. T.... 🔴🟢Breaking:-2- Elon Musk says Grok is parroting legacy media and they are working to fix it... Don't forget to follow as more updates #GENIUSActPass #ElonMuskTalks #iran #Tron #Haker
🔴🟢Breaking:- Iranian crypto exchange Nobitex hacked for $48 million.

Funds were sent to the following TRON wallet:-..
T....

🔴🟢Breaking:-2- Elon Musk says Grok is parroting legacy media and they are working to fix it...

Don't forget to follow as more updates

#GENIUSActPass #ElonMuskTalks #iran #Tron #Haker
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number